Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

CC0002 Quiz Preparation (This is created for practice; not the actual quiz)

Introduction To Excel

1. Which Excel formula is not able to be used?


a. = COUNT
b. = MAX
c. = SORT
d. = SUM
e. None of the above

E. All the other functions are available in the new version of Excel.

Computational Thinking and Problem Solving

2. Which one of the following is true about decomposition?


a. Process of divide-and-conquer
b. Process of filtering out extraneous details
c. Step-by-step process to solve the problem
d. Recognising shared similarities and shared differences in the problem

A. A is decomposition. B is Abstraction. C is Algorithmic Thinking. D is Pattern


Recognistion.

3. Which application is relevant to apply Pattern Recognition?


a. South Korea’s subway map
b. Following the recipe for baking a cake
c. Grouping students based on their common characteristics
d. Studying the human body by looking at different organ systems

C.
A is an abstraction process because we want to look for the most important details in a
complex subway map.
B is an algorithmic thinking process because we are following a step-by-step process for
baking a cake.
C is a pattern recognition process because we have identified the shared similarities in
the problem where all the students are different in many aspects.
D is a process of decomposition by breaking down to different systems in a complex
human body.
4. Mr. Lim wants to purchase a housing property in Singapore. Which computational thinking
method is best applicable in this situation if he wants a housing property that costs lower
than his budget?
a. Decomposition
b. Pattern Recognition
c. Algorithmic Thinking
d. Abstraction

B. To find suitable housing properties, he first needs to find a common characteristic:


costs that are lower than his budget. As such, the best computational thinking is Pattern
Recognition where he finds a pattern of housing properties that meets this condition.
Option D (abstraction) is ideal too, but Option B is more applicable in this situation.

5. Which application is used in the process of Algorithmic Thinking?


a. Pseudocodes in Computer Science
b. Gene Biology
c. Law legal process
d. Machine learning

C. A is an example of abstraction, while B and D are examples of Pattern Recognition.

Quantitative Reasoning Techniques

6. Which option is true about using multiple predictors during estimation?


a. Improves prediction outcome
b. No impact on prediction
c. Depends on the problem, even one predictor is sufficient to predict efficiently
d. None of the above

C. Multiple predictors are used to increase reliability and accuracy, but this does not
mean the prediction will always be true.

Managing Cybersecurity

7. To handle classified data, what level of security should be adopted?


a. Level 1
b. Level 2
c. Level 3
d. Level 4

D.
Level 1: open;
Level 2: restricted;
Level 3: confidential;
Level 4: classified. Level 4 deals with information that can cause damages to national
security.
8. What is the importance of managing cybersecurity?
a. Securing works of data that we use from unauthorized access or even malicious attacks
b. Protect businesses that are prone to cyberattacks
c. Protects individuals’ personal sensitive information such as financial data that can be
sold for profit
d. All of the above

9. Which element is useful to attain a strong password?


a. 8 characters long minimum
b. Contains numbers and symbols
c. Contains upper and lower-case letters
d. All of the above

10. What does the AIUP document state?


a. Update passwords regularly
b. Use Bind Carbon Copy in emails
c. Keep software updated with security patches
d. All of the above

11. What function does the NTU Cyber Security Team have?
a. Governance
b. Engineering
c. Defense
d. All of the above

D.
NTU Cyber Security Governance: development and maintenance of policies
NTU Cyber Security Engineering: explore technologies to enhance security capabilities
NTU Cyber Security Defense: manage 24/7 security operation centre (SOC) to detect
and respond to any cyber-attacks

The World of Digitial Misinformation

12. What does misinformation refer to?


a. None of the options
b. Inadvertent dissemination of false information
c. Intentional dissemination of false information
d. Information meant to deceive others

B. C is the definition of disinformation and D is the definition of fake news.

13. Which is NOT a possible reason why people may ignore fake news on social media?
a. The topic is irrelevant to them
b. They think that taking action will not have any impact
c. They do not want to hurt the feelings of those who posted the incorrect post
d. They believe that the fake news will be taken down eventually
14. Which of the following could be reasons for using deepfake with malicious intent?
a. All of the options
b. Influence stock price
c. Influence election results
d. To undermine reputation of a product

A. Option B is monetary; option C is political and option D is defamatory. These are 3


reasons for malicious intent to occur.

15. What is the difference between verification and fact-checking?


a. Verification is a process of evaluating whether a story is true before it becomes news
while fact-checking is a process that compares a claim against trusted sources post-
publication.
b. Verification is a process of evaluating whether a story is true after it becomes news
while fact-checking is a process that compares a claim against trusted sources pre-
publication.
c. Verification is a process that compares a claim against trusted source pre-publication
while fact-checking is a process of evaluating whether a story is true after it becomes
news.
d. Verification is a process that compares a claim against trusted source post-publication
while fact-checking is a process of evaluating whether a story is true before it becomes
news.

Principle of Data Ethics in the Digital World

16. What is the definition of cyberbullying?


a. The use of the internet with malicious intent
b. The use of the internet to inflict psychological harm
c. The use of the internet with a lack of integrity
d. All of the above

B. Cyberbullying is the use of the internet or digital devices to inflict psychological


harm on a person or group (Quinn, 2019; Media Literacy Council 2018).

17. When is it morally obligatory for whistleblowing?


a. The firm has done serious and considerable harm to employees or to the public.
b. If one's immediate supervisor does nothing effective about the concern or complaint,
the employee should exhaust the internal procedures and possibilities within the firm.
c. The employee must have good reasons to believe that by going public the necessary
changes will be brought about. The chance of being successful must be worth the risk
one takes and the danger to which one is exposed.
d. Once employees identify a serious threat to the user of a product or to the general public,
they should report it to their immediate superior and make their moral concern known.

C.
Morally permissible when three conditions are fulfilled:
1. The firm…will do [or has done] serious and considerable harm to employees or to the
public;
2. Once employees identify a serious threat to the user of a product or to the general
public, they should report it to their immediate superior and make their moral concern
known;
3. If one's immediate supervisor does nothing effective about the concern or complaint,
the employee should exhaust the internal procedures and possibilities within the firm.
Morally obligatory when two additional conditions are fulfilled:
4. The whistle blower must have, or have accessible, documented evidence that would
convince a reasonable, impartial observer that one's view of the situation is correct; and
5. The employee must have good reasons to believe that by going public the necessary
changes will be brought about. The chance of being successful must be worth the risk
one takes and the danger to which one is exposed.
Objections
1.too stringent (can be morally permissible without fulfilling the 3 conditions)
2.not demanding enough (can be morally obligatory without fulfilling the 2 conditions)

18. What does NTU’s Ethics and Compliance Committee (ECC) do?
a. Whistle blowing channel
b. Forms ethical guidelines
c. Ban any unethical use of data
d. None of the above

A. The Ethics and Compliance Committee (ECC) will consider and investigate any
legitimate concern or incident raised, or information provided in connection with
the concern/incident, which was submitted through the whistle-blowing form.

19. Mary has confidential information about the Singapore Computer Society’s members’
contacts. Her husband asked her for the contacts so that he can sell computers to the
members. Mary agreed. Which code of conduct did she violate?
a. Not seek personal advantage to the detriment of the society
b. Act with complete discretion when dealing with confidential information
c. Be impartial when giving advice and disclose any relevant personal interests
d. All of the above

Intellectual Properties, Rights and Data Privacy

20. Which of the following is most likely to violate copyright law?


a. A book with similar story but different setting
b. A book with similar story but different characters
c. A book with similar story but different inspirations
d. None of the options

D. Copyright is the right to prevent unauthorised copying of the tangible form in which
a person has chosen to express his/her ideas. Ideas and concepts are unprotectable
material not covered under copyright law.
21. A company created an application. Which intellectual property should it be protected under?
a. Patent
b. Literary Copyright
c. Artistic Copyright
d. Trademark

B. An application is not an invention, so it is not appropriate to patent it. The application


source code, however, is in a tangible and perceivable form, and is hence protected
under copyright as a literary work.

22. What is the duration of copyright for a TV broadcast?


a. 100 years
b. 70 years
c. 50 years
d. 25 years

C. Most copyright durations last for 70 years, except broadcasts such as TV, radios, cable
programmes last for 50 years while published editions last for 25 years.

23. Dason went to a professional networking website. Which of the following information can
he not provide?
a. Name and phone number
b. Email
c. Education profile
d. All of the options

D. A right to privacy is recognised in all international and regional human rights


instruments, including Article 12 the Universal Declaration of Human Rights:
• No one shall be subjected to arbitrary interference with his privacy, family, home
or correspondence, nor to attacks upon his honour and reputation. Everyone has
the right to the protection of the law against such interference or attacks.
Dason has the absolute right to decide if he wants to provide the information to the
networking website, and what information to provide. (Consider also the Terms of Use
of the website.)

24. Solar Inc. developed a new technology that can drastically reduce the cost of solar panels.
Which intellectual property is this invention protected under?
a. Copyright
b. Patent
c. Registered design
d. Trademark

B. The new technology developed can be regarded as a new invention, which is a


technical solution to a problem. Hence, it can be protected under a patent.
25. Which of the following intellectual properties is not correct?
a. Copyright of the ingredients to a recipe
b. Patent of a process
c. Patent of an invention
d. None of the above

A. Matter that is unprotectable by copyright include:


• Ideas and concepts, discoveries (e.g. a research finding), procedures (e.g. steps
in applying for a grant), methods (e.g. solutions to a mathematical problem),
any subject matter that has not been reduced to a tangible form, works in the
public domain.
The ingredients to a recipe constitute a method, and is not protectable under copyright.
A process/procedure, although not protectable under copyright, may be patented.
Similarly, a new invention, which is a discovery, is not protectable under copyright and
may be patented.

26. A company came out with a new drug to defeat COVID-19. What would a normal company
do first?
a. File for copyright for all data gathered
b. File for non-disclosure and apply for patent
c. File for a license
d. File for a trademark

B. Data gathered/generated from the research is unprotectable matter according to


copyright law. Copyright protects unauthorised copying of the tangible form in which a
person has chosen to express his/her ideas. Ideas and concepts, including data, are
unprotectable material not covered under copyright law.

27. What intellectual property is the recipe for Coca Cola considered as?
a. Trade secret (confidential information)
b. Patent
c. Copyright
d. Trademark

A. Option B is a new type of paper clip while option c is a software code. D is a made-
up word with a brand name.
28. For an intellectual property assignment, which statement is false?
a. An assignment is another type of contract where the assignor transfers all entitlement
and ownership rights that are the subject of the assignment to the assignee, which
becomes the new owner of the property.
b. The contract must be in writing.
c. The contract must be signed by or on behalf of the assignor.
d. An assignment is cheaper than a license.

D. An assignment is more expensive than a license.


License Assignment
Grants someone the right to use IP Transfers entire title in someone’s IP to another
Less costly More costly
IP owner remains in control IP owner gives up in control

29. Which element can be excluded when forming a contract?


a. Offer
b. Acceptance
c. Consideration
d. Intention to create legal relations
e. None of the options

E. All elements: OFFER, ACCEPTANCE, CONSIDERATION, INTENTION TO


CREATE LEGAL RELATIONS & CAPACITY must be included for a contract to be
formed.

30. What is the benefit of copyright?


a. It allows the creator to control and exploit the use of intellectual property for a specific
period of time.
b. It allows creators to defend their works from infringement or commercial gain.
c. It provides motivation and encourages constant creation and innovation for creators.
d. All of the above.

D. IP law (1) provides motivation for creators, (2) encourages constant creation and
innovation, (3) allows creators to exploit their works for commercial gain, (4) allows
creators to defend their works from infringement.

31. What does PDPC stand for?


a. Personal Data Protection Community
b. Personal Data Protection Commission
c. Personal Data Protection Connection
d. Personal Data Protection Computerisation

B. PDPC stands for Personal Data Protection Commission that promotes and enforces
personal data protection to foster an environment of trust among businesses and
consumers in Singapore.
32. The Personal Data Protection Act (PDPA) has what objectives?
a. Safeguard personal data from misuse and to maintain individuals’ trust in organisations
that manage their data
b. Regulating flow of personal data among organisations
c. Strengthen Singapore's position as a trusted hub for businesses
d. All of the options

D.
The PDPA recognises both the need to protect individuals’ personal data and the need of
organisations to collect, use or disclose personal data for legitimate and reasonable
purposes.
A data protection regime is necessary to safeguard personal data from misuse and to
maintain individuals’ trust in organisations that manage their data. (Objective 1)
By regulating the flow of personal data among organisations, the PDPA also aims to
strengthen Singapore’s position as a trusted hub for businesses. (Objective 2 and 3)

33. What is the meaning of CC BY-NC-ND?


a. Attribution-NonCommercial-NoDerivatives
b. Attribution-ShareAlike
c. NonCommercial-NoDerivatives
d. ShareAlike-NonCommercial-NoDerivatives

A. Understand that BY: Attribution, NC: NonCommercial, ND: NoDerivs, SA:


ShareAlike
A Creative Commons (CC) license is one of several public copyright licenses that enable
the free distribution of an otherwise copyrighted work. It is issued by the copyright owner
to allow anyone in the world to use his or her copyright work in any manner consistent
with that license. There are six different CC licenses:
• CC BY: Use in any manner and with attribution.
• CC BY-SA: Use in any manner, with the new creation being shared under the
same license (ShareAlike) with attribution.
• CC BY-NC: Use in any non-commercial manner and with attribution.
• CC BY-ND: Use with no derivatives (ND) allowed and with attribution.
• CC BY-NC-SA: Use in any non-commercial manner with the new creation
being shared under the same license with attribution.
• CC BY-NC-ND: Use with no derivatives allowed, in a non-commercial
manner, and with attribution.
Introduction to Artificial Intelligence (AI)

34. What contributed to the advancement in/renaissance of AI in modern day/recent years?


a. Advancements in computer components, more data, improved algorithms
b. Advancements in computer components, more data, interest in the concept of AI
c. Improved algorithms, interest in the concept of AI, more data
d. None of the above

A. Although there has always been interest in AI since the 1950s, not much progress
was achieved. However, in recent years, the renaissance of AI occurred, primarily due to
3 reasons:
1. Powerful computers
- Access to high performance computing machines, which was not available in the
past.
2. Big data
- Availability of a large amount of data that can be collected, due to the ubiquity of
devices
3. Software algorithms
- Advancements made in more sophisticated algorithms allowed for machine learning
and deep learning, e.g. learning based on deep neural networks.
Interest in the concept of AI has always been existent, so it is not a contributory factor
for advancement in AI in modern day.

35. What is the meaning of ‘deep’ in deep learning?


a. Multiple layered neural network learning
b. Single layer neural network learning
c. Double layered neural network learning
d. None of the above

A. Deep learning is a subset of machine learning. Neural networks make up the


backbone of the various deep learning algorithms. The neural networks used in deep
learning try to mimic the human brain that are designed to recognise patterns and possess
the ability to learn on its own.
The most basic neural networks consist of three layers - an input layer, a hidden
layer, and the output layer. The hidden layer consists of parameters that can be trained
when it is fed with large amounts of data. It is the layer that contains the algorithms that
learn and improve through the process of training. Deep learning uses deep neural
networks, which unlike single neural networks (which have only one hidden layer),
comprise of multiple layers of hidden layers. The algorithms within the hidden layers
are known as deep learning. With more hidden layers in deep neural networks, much
more sophisticated algorithms can be learnt.

Examples of the popular neural networks used in deep learning include the following:
1. Artificial Neural Network (ANN), used for classifying numbers-based data
2. Convolution Neural Network (CNN), used for classifying images
3. Recurrent Neural Network (RNN), used for time series data such as audio
Deep Reinforcement Learning is a combination of reinforcement learning and
deep learning. Transfer Learning is where a model trained on one task is
repurposed for other/certain related tasks. It is used in deep learning.
36. Which of the following is a form of supervised learning?
a. Expected results of the data, labelled with the input data, are fed into the machines
b. Only the input data that is not labelled is input into the machine
c. Use of ‘agent’ to learn to maximise ‘reward’ in an environment
d. None of the options

A.
Machine learning: A large amount of data is needed to train the machine in order for it
to learn about the data. There are three broad/popular approaches used in machine
learning.
1. Supervised learning, where the expected output results of the data, labelled with
the input data, are fed into the machines. Some of the techniques used in supervised
learning include regression and classification.
2. Unsupervised learning, where only the input data is input into the machine for
the machine to find a pattern within the data. An example of this approach is
clustering.
3. Reinforcement learning, where the objective is not to find a pattern, but to
maximise rewards/achieve a goal within the application environment.

37. Which of the following learning saves time from repeatedly crafting and modelling
algorithms to do similar tasks?
a. Deep Learning
b. Deep Reinforcement Learning
c. Transfer Learning
d. Supervised Learning

C. Deep learning is not the answer as it is not specific enough.


Deep Reinforcement Learning is a combination of reinforcement learning and deep
learning.
Transfer Learning is where a model trained on one task is repurposed for other/certain
related tasks. It is used in deep learning.
Both are subsets of deep learning.

38. Which of the following statements is incorrect?


a. Neurons and neural network has input, hidden and output layers
b. Deep neural networks have multiple hidden layers
c. A hidden layer has learnable parameters
d. Convolution neural network only occurs at output layer

D. The neural network refers to the input, hidden and output layers, thus option D is
incorrect.

39. Which deep learning neural network is suitable for images?


a. Artificial Neural Network (ANN)
b. Convolution Neural Network (CNN)
c. Recurrent Neural Network (RNN)
d. All of the above

B. ANN is used for classifying numbers-based data, CNN is used for classifying images
and RNN is used for time series data such as audio.
40. What are the current generation of AI technologies considered as?
a. Artificial Narrow Intelligence
b. Artificial General Intelligence
c. Artificial Smart Intelligence
d. Artificial Wide Intelligence

A. Current generation of AI technologies are still considered as Artificial Narrow


Intelligence (ANI). Goal is to eventually achieve Artificial General Intelligence
(AGI).

Blockchain

41. What is the purpose of the hash function?


a. To convert a fixed-size data into a non-fixed size data
b. To convert a non-fixed size data into a fixed-size data
c. Produces the same output for the same input every single time
d. Produces different outputs for the same input every single time

B. The hash function is a mathematical algorithm that transforms any kind of message
into a bit array of a fix sized (the “hash value”), regardless of the size of the input
message. It is a one-way, deterministic function and is infeasible to invert. Option C
refers to a deterministic function that is the one that produces the same output for the
same input every single time. The opposite of a deterministic function is a probabilistic
function.

42. Which of the following is NOT a function of blockchain?


a. Data exchange and storage including cryptography
b. Distributed consensus protocols
c. Peer-to-peer network
d. Smart contract
e. None of the above

E. All of the options are functions of blockchain. Blockchain is tamper-proof.


Blockchain is a public database (or public ledger) based on a combination of
technologies for data exchange, processing, and storage, including cryptography,
distributed consensus protocols, peer to peer network communication technologies,
and smart contract. It is also tamper-proof.
A blockchain may be a public chain, consortium chain, or a private chain.
• A public chain e.g. Bitcoin and Ethereum, is permissionless. Anyone who is
connected to the Internet can join a public blockchain network and become a part
of it without permission.
• A consortium chain is a blockchain with different access rights, depending on
the user.
• A private chain is a restricted blockchain operating in a closed network that
requires permission to join.
43. What makes consensus hard in blockchain?
a. Blockchain is too complicated for a consensus to be achieved
b. Blockchain is considered to be completely secured and verified
c. Blockchain requires a large percentage of users, but not all, to agree
d. All of the above

C. By consensus, we mean that a general agreement has been reached. In regards to


blockchain, the process is formalised, and reaching consensus means that at least 51%
of the nodes on the network agree on the next global state of the network. However,
this is complicated by the fact that Blockchain is a distributed decentralised network
with no central authority present to validate and verify the transactions.

More about consensus algorithms in blockchain


Blockchain is a distributed decentralized network that provides immutability, privacy,
security, and transparency. There is no central authority present to validate and verify the
transactions, yet every transaction in the Blockchain is considered to be completely
secured and verified. This is possible only because of the presence of the consensus
protocol which is a core part of any Blockchain network.
A consensus algorithm is a procedure through which all the peers of the Blockchain
network reach a common agreement about the present state of the distributed ledger. In
this way, consensus algorithms achieve reliability in the Blockchain network and
establish trust between unknown peers in a distributed computing environment.
Essentially, the consensus protocol makes sure that every new block that is added to the
Blockchain is the one and only version of the truth that is agreed upon by all the nodes
in the Blockchain.
The Blockchain consensus protocol consists of some specific objectives such as coming
to an agreement, collaboration, co-operation, equal rights to every node, and mandatory
participation of each node in the consensus process. Thus, a consensus algorithm aims at
finding a common agreement that is a win for the entire network

44. What makes a blockchain immutable?


a. Cryptographic system uses cryptographic hashes.
b. Transparency of blockchain
c. Decentralisation of blockchain
d. All of the above

D.
Reason 1: Cryptographic system which uses cryptographic hashes.
Once a block is created on the chain, it cannot be modified. Any modification to old data
will result in a completely different hash. However, it is possible to add new information
to the blockchain. This restricts people from reversing any transaction that has already
taken place.
Reason 2: Transparency of blockchain
All transactions on the network are accessible to the public and can be inspected by
anyone, making it easy to detect fraudulent blocks.
Reason 3: Decentralisation of blockchain
Decentralisation of blockchain means that there is no single point of failure. In the event
that something goes wrong on one server, there are other servers to refer to.
45. Why is blockchain mining said to consume resources and time?
a. It requires a few miners to solve complex mathematical problems due to the
cryptographic hash function that is being used recursively.
b. The process of merkle tree root for the transactions is too time-consuming, as such, the
mining of such process explains why.
c. It is too complex to identify the data.
d. None of the above.

A. The cryptographic hash function, while deterministic, is a one-way function and


infeasible to invert. It requires brute force to guess the original input.

46. What is the purpose of hashing in blockchain?


a. Keep the authenticity of the underlying information
b. For the information to be infeasible to invert to non-fixed size data
c. To allow for the Merkle tree root transactions to occur
d. All of the above

A. Recursively hashing nodes in blockchain efficiently summarises and verifies the


integrity of large sets of data through the Merkle tree root. This, combined with the
hashing of the block header, which comprises of the (1) Merkle tree root for the
transactions, (2) the nonce, (3) the timestamp, the (4) hash value of the previous block,
(5) the version number, and (6) the difficulty (also known as the nBits).

47. Which type of blockchain is best suited for organisation collaborations?


a. Public chain
b. Consortium chain
c. Private chain
d. None of the above

B. Public chain is permissionless, consortium chain allows for different access rights
suited for organisation collaborations and private chain needs permission that is mostly
used within an organisation itself.

48. What information does each blockchain in Bitcoin contain?


a. Prev hash
b. Timestamp
c. Merkle tree root of transaction information
d. Nonce
e. All of the above
49. What does consortium and supply chain finance do for financial institutions?
a. Optimize working capital
b. Reduce supply chain risks and operational costs
c. Service SMEs and effective risk control
d. Ease the lack of credit and increases sales

C.
For suppliers: ease the lack of credit and increases sales
For core enterprises: optimise working capital, reduce supply chain risks and reduce
operational costs
For financial institutions: Service SMEs and provides effective risk control

50. Which of the following is a challenge of using blockchain?


a. Scalability
b. Transparency
c. Security
d. Costs

A.
Opportunities Challenges
Improves transparency Technological Risk
Improves security Scalability problems
Lowers costs Regulatory issues

You might also like